CINXE.COM
Search results for: proxy server
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: proxy server</title> <meta name="description" content="Search results for: proxy server"> <meta name="keywords" content="proxy server"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="proxy server" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="proxy server"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 463</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: proxy server</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">463</span> Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoming%20Jiang">Xiaoming Jiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jinqiao%20Shi"> Jinqiao Shi</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingfeng%20Tan"> Qingfeng Tan</a>, <a href="https://publications.waset.org/abstracts/search?q=Wentao%20Zhang"> Wentao Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xuebin%20Wang"> Xuebin Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Muqian%20Chen"> Muqian Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proxy%20server" title="proxy server">proxy server</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20queue" title=" priority queue"> priority queue</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization%20algorithm" title=" optimization algorithm"> optimization algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20web%20crawling" title=" distributed web crawling"> distributed web crawling</a> </p> <a href="https://publications.waset.org/abstracts/43957/proxisch-an-optimization-approach-of-large-scale-unstable-proxy-servers-scheduling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43957.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">211</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">462</span> An Efficient Proxy Signature Scheme Over a Secure Communications Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title="proxy signature">proxy signature</a>, <a href="https://publications.waset.org/abstracts/search?q=warrant%20partial%20delegation" title=" warrant partial delegation"> warrant partial delegation</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement" title=" key agreement"> key agreement</a>, <a href="https://publications.waset.org/abstracts/search?q=discrete%20logarithm" title=" discrete logarithm"> discrete logarithm</a> </p> <a href="https://publications.waset.org/abstracts/51599/an-efficient-proxy-signature-scheme-over-a-secure-communications-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">461</span> Degradation of Polycyclic Aromatic Hydrocarbons-Contaminated Soil by Proxy-Acid Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Samsami">Reza Samsami</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the study was to degradation of polycyclic aromatic hydrocarbons (PAHs) by proxy-acid method. The amounts of PAHs were determined in a silty-clay soil sample of an aged oil refinery field in Abadan, Iran. Proxy-acid treatment method was investigated. The results have shown that the proxy-acid system is an effective method for degradation of PAHs. The results also demonstrated that the number of fused aromatic rings have not significant effects on PAH removal by proxy-acid method. The results also demonstrated that the number of fused aromatic rings have not significant effects on PAH removal by proxy-acid method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proxy-acid%20treatment" title="proxy-acid treatment">proxy-acid treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=silty-clay%20soil" title=" silty-clay soil"> silty-clay soil</a>, <a href="https://publications.waset.org/abstracts/search?q=PAHs" title=" PAHs"> PAHs</a>, <a href="https://publications.waset.org/abstracts/search?q=degradation" title=" degradation"> degradation</a> </p> <a href="https://publications.waset.org/abstracts/42444/degradation-of-polycyclic-aromatic-hydrocarbons-contaminated-soil-by-proxy-acid-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42444.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">267</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">460</span> On Four Models of a Three Server Queue with Optional Server Vacations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kailash%20C.%20Madan">Kailash C. Madan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We study four models of a three server queueing system with Bernoulli schedule optional server vacations. Customers arriving at the system one by one in a Poisson process are provided identical exponential service by three parallel servers according to a first-come, first served queue discipline. In model A, all three servers may be allowed a vacation at one time, in Model B at the most two of the three servers may be allowed a vacation at one time, in model C at the most one server is allowed a vacation, and in model D no server is allowed a vacation. We study steady the state behavior of the four models and obtain steady state probability generating functions for the queue size at a random point of time for all states of the system. In model D, a known result for a three server queueing system without server vacations is derived. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=a%20three%20server%20queue" title="a three server queue">a three server queue</a>, <a href="https://publications.waset.org/abstracts/search?q=Bernoulli%20schedule%20server%20vacations" title=" Bernoulli schedule server vacations"> Bernoulli schedule server vacations</a>, <a href="https://publications.waset.org/abstracts/search?q=queue%20size%20distribution%20at%20a%20random%20epoch" title=" queue size distribution at a random epoch"> queue size distribution at a random epoch</a>, <a href="https://publications.waset.org/abstracts/search?q=steady%20state" title=" steady state"> steady state</a> </p> <a href="https://publications.waset.org/abstracts/50668/on-four-models-of-a-three-server-queue-with-optional-server-vacations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50668.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">459</span> Client Hacked Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagul%20Abhijeet">Bagul Abhijeet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hacking" title="Hacking">Hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Vulnerabilities" title=" Vulnerabilities"> Vulnerabilities</a>, <a href="https://publications.waset.org/abstracts/search?q=Dummy%20request" title=" Dummy request"> Dummy request</a>, <a href="https://publications.waset.org/abstracts/search?q=Virus" title=" Virus"> Virus</a>, <a href="https://publications.waset.org/abstracts/search?q=Server%20monitoring" title=" Server monitoring"> Server monitoring</a> </p> <a href="https://publications.waset.org/abstracts/36777/client-hacked-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">458</span> Computer Server Virtualization </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pradeep%20M.%20C.%20Chand">Pradeep M. C. Chand </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Virtual infrastructure initiatives often spring from data center server consolidation projects, which focus on reducing existing infrastructure “box count”, retiring older hardware or life-extending legacy applications. Server consolidation benefits result from a reduction in the overall number of systems and related recurring costs (power, cooling, rack space, etc.) and also helps in the reduction of heat to the environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=server%20virtualization" title="server virtualization">server virtualization</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20center" title=" data center"> data center</a>, <a href="https://publications.waset.org/abstracts/search?q=consolidation" title=" consolidation"> consolidation</a>, <a href="https://publications.waset.org/abstracts/search?q=project" title=" project"> project</a> </p> <a href="https://publications.waset.org/abstracts/20268/computer-server-virtualization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">530</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">457</span> Secure Proxy Signature Based on Factoring and Discrete Logarithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discrete%20logarithm" title="discrete logarithm">discrete logarithm</a>, <a href="https://publications.waset.org/abstracts/search?q=factoring" title=" factoring"> factoring</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title=" proxy signature"> proxy signature</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement" title=" key agreement"> key agreement</a> </p> <a href="https://publications.waset.org/abstracts/51597/secure-proxy-signature-based-on-factoring-and-discrete-logarithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51597.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">456</span> Web Proxy Detection via Bipartite Graphs and One-Mode Projections</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhipeng%20Chen">Zhipeng Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Peng%20Zhang"> Peng Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qingyun%20Liu"> Qingyun Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Guo"> Li Guo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bipartite%20graph" title="bipartite graph">bipartite graph</a>, <a href="https://publications.waset.org/abstracts/search?q=one-mode%20projection" title=" one-mode projection"> one-mode projection</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20proxy%20detection" title=" web proxy detection"> web proxy detection</a> </p> <a href="https://publications.waset.org/abstracts/87483/web-proxy-detection-via-bipartite-graphs-and-one-mode-projections" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">455</span> A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bodhayan%20Nandi">Bodhayan Nandi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shubhajit%20Roy%20Chowdhury"> Shubhajit Roy Chowdhury</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=non%20invasive" title="non invasive">non invasive</a>, <a href="https://publications.waset.org/abstracts/search?q=blood%20glucose%20concentration" title=" blood glucose concentration"> blood glucose concentration</a>, <a href="https://publications.waset.org/abstracts/search?q=microcontroller" title=" microcontroller"> microcontroller</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=application%20server" title=" application server"> application server</a>, <a href="https://publications.waset.org/abstracts/search?q=database%20server" title=" database server"> database server</a> </p> <a href="https://publications.waset.org/abstracts/85488/a-non-invasive-blood-glucose-monitoring-system-using-near-infrared-spectroscopy-with-remote-data-logging" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">220</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">454</span> Automated Server Configuration Management using Ansible</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kartik%20Mahajan">Kartik Mahajan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> DevOps methodologies streamline software development and operations, promoting collaboration and automation. Traditional server management often relies on manual, repetitive tasks, leading to inefficiencies, potential errors, and increased operational costs. Ansible, as a configuration management tool, presents a compelling solution for automating infrastructure management processes. This review paper explores the implementation and testing of Ansible for server management, specifically focusing on automated user account configuration. By replacing manual procedures with Ansible playbooks, we aim to optimize server management, reduce human error, and potentially mitigate operational expenses. This study offers insights into Ansible’s efficacy within a DevOps context, highlighting its potential to transform server administration practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=Devops" title=" Devops"> Devops</a>, <a href="https://publications.waset.org/abstracts/search?q=automation" title=" automation"> automation</a>, <a href="https://publications.waset.org/abstracts/search?q=ansible" title=" ansible"> ansible</a> </p> <a href="https://publications.waset.org/abstracts/184587/automated-server-configuration-management-using-ansible" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184587.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">44</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">453</span> Performance Evaluation of a Prioritized, Limited Multi-Server Processor-Sharing System that Includes Servers with Various Capacities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yoshiaki%20Shikata">Yoshiaki Shikata</a>, <a href="https://publications.waset.org/abstracts/search?q=Nobutane%20Hanayama"> Nobutane Hanayama</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We present a prioritized, limited multi-server processor sharing (PS) system where each server has various capacities, and N (≥2) priority classes are allowed in each PS server. In each prioritized, limited server, different service ratio is assigned to each class request, and the number of requests to be processed is limited to less than a certain number. Routing strategies of such prioritized, limited multi-server PS systems that take into account the capacity of each server are also presented, and a performance evaluation procedure for these strategies is discussed. Practical performance measures of these strategies, such as loss probability, mean waiting time, and mean sojourn time, are evaluated via simulation. In the PS server, at the arrival (or departure) of a request, the extension (shortening) of the remaining sojourn time of each request receiving service can be calculated by using the number of requests of each class and the priority ratio. Utilising a simulation program which executes these events and calculations, the performance of the proposed prioritized, limited multi-server PS rule can be analyzed. From the evaluation results, most suitable routing strategy for the loss or waiting system is clarified. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=processor%20sharing" title="processor sharing">processor sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-server" title=" multi-server"> multi-server</a>, <a href="https://publications.waset.org/abstracts/search?q=various%20capacity" title=" various capacity"> various capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=N-priority%20classes" title=" N-priority classes"> N-priority classes</a>, <a href="https://publications.waset.org/abstracts/search?q=routing%20strategy" title=" routing strategy"> routing strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=loss%20probability" title=" loss probability"> loss probability</a>, <a href="https://publications.waset.org/abstracts/search?q=mean%20sojourn%20time" title=" mean sojourn time"> mean sojourn time</a>, <a href="https://publications.waset.org/abstracts/search?q=mean%20waiting%20time" title=" mean waiting time"> mean waiting time</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a> </p> <a href="https://publications.waset.org/abstracts/45569/performance-evaluation-of-a-prioritized-limited-multi-server-processor-sharing-system-that-includes-servers-with-various-capacities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">452</span> Autonomic Recovery Plan with Server Virtualization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Hameed">S. Hameed</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Anwer"> S. Anwer</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Saad"> M. Saad</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Saady"> M. Saady</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For autonomic recovery with server virtualization, a cogent plan that includes recovery techniques and backups with virtualized servers can be developed instead of assigning an idle server to backup operations. In addition to hardware cost reduction and data center trail, the disaster recovery plan can ensure system uptime and to meet objectives of high availability, recovery time, recovery point, server provisioning, and quality of services. This autonomic solution would also support disaster management, testing, and development of the recovery site. In this research, a workflow plan is proposed for supporting disaster recovery with virtualization providing virtual monitoring, requirements engineering, solution decision making, quality testing, and disaster management. This recovery model would make disaster recovery a lot easier, faster, and less error prone. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autonomous%20intelligence" title="autonomous intelligence">autonomous intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=disaster%20recovery" title=" disaster recovery"> disaster recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=server%20virtualization" title=" server virtualization"> server virtualization</a> </p> <a href="https://publications.waset.org/abstracts/129654/autonomic-recovery-plan-with-server-virtualization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">451</span> Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xi%20Xiao">Xi Xiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Chunhui%20Chen"> Chunhui Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Xinyu%20Liu"> Xinyu Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Guangwu%20Hu"> Guangwu Hu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yong%20Jiang"> Yong Jiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20online%20social%20networks" title="mobile online social networks">mobile online social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=client%2Fserver%20architecture" title=" client/server architecture"> client/server architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20sharing" title=" location sharing"> location sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy-preserving" title=" privacy-preserving"> privacy-preserving</a> </p> <a href="https://publications.waset.org/abstracts/57662/privacy-preserving-location-sharing-system-with-clientserver-architecture-in-mobile-online-social-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">450</span> Analysis of the Unreliable M/G/1 Retrial Queue with Impatient Customers and Server Vacation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fazia%20Rahmoune">Fazia Rahmoune</a>, <a href="https://publications.waset.org/abstracts/search?q=Sofiane%20Ziani"> Sofiane Ziani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Retrial queueing systems have been extensively used to stochastically model many problems arising in computer networks, telecommunication, telephone systems, among others. In this work, we consider a $M/G/1$ retrial queue with an unreliable server with random vacations and two types of primary customers, persistent and impatient. This model involves the unreliability of the server, which can be subject to physical breakdowns and takes into account the correctives maintenances for restoring the service when a failure occurs. On the other hand, we consider random vacations, which can model the preventives maintenances for improving system performances and preventing breakdowns. We give the necessary and sufficient stability condition of the system. Then, we obtain the joint probability distribution of the server state and the number of customers in orbit and derive the more useful performance measures analytically. Moreover, we also analyze the busy period of the system. Finally, we derive the stability condition and the generating function of the stationary distribution of the number of customers in the system when there is no vacations and impatient customers, and when there is no vacations, server failures and impatient customers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=modeling" title="modeling">modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=retrial%20queue" title=" retrial queue"> retrial queue</a>, <a href="https://publications.waset.org/abstracts/search?q=unreliable%20server" title=" unreliable server"> unreliable server</a>, <a href="https://publications.waset.org/abstracts/search?q=vacation" title=" vacation"> vacation</a>, <a href="https://publications.waset.org/abstracts/search?q=stochastic%20analysis" title=" stochastic analysis"> stochastic analysis</a> </p> <a href="https://publications.waset.org/abstracts/109241/analysis-of-the-unreliable-mg1-retrial-queue-with-impatient-customers-and-server-vacation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">187</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">449</span> Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jerlin%20George">Jerlin George</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Chitra"> R. Chitra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=sensors" title=" sensors"> sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20health%20records" title=" electronic health records"> electronic health records</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20re-encryption" title=" proxy re-encryption"> proxy re-encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title=" data privacy"> data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a> </p> <a href="https://publications.waset.org/abstracts/192971/securing-health-monitoring-in-internet-of-things-with-blockchain-based-proxy-re-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192971.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">17</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">448</span> Reliability Analysis of Computer Centre at Yobe State University Nigeria under Different Repair Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Vir%20Singh">Vijay Vir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as local server). Observing the different possibilities of functioning of the CC, analysis has been done to evaluate the various reliability characteristics of the system. The system can completely fail due to failure of router, redundant server before repairing the mail server, and switch failure. The system can also partially fail when local server fails. The system can also fail completely due to a cooling failure, electricity failure or some natural calamity like earthquake, fire etc. All the failure rates are assumed to be constant while repair follows two types of distributions: general and Gumbel-Hougaard family copula. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reliability" title="reliability">reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=availability%20Gumbel-Hougaard%20family%20copula" title=" availability Gumbel-Hougaard family copula"> availability Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=MTTF" title=" MTTF"> MTTF</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20data%20centre" title=" internet data centre "> internet data centre </a> </p> <a href="https://publications.waset.org/abstracts/32380/reliability-analysis-of-computer-centre-at-yobe-state-university-nigeria-under-different-repair-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32380.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">461</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">447</span> Hardware Error Analysis and Severity Characterization in Linux-Based Server Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nikolaos%20Georgoulopoulos">Nikolaos Georgoulopoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Alkis%20Hatzopoulos"> Alkis Hatzopoulos</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Karamitsios"> Konstantinos Karamitsios</a>, <a href="https://publications.waset.org/abstracts/search?q=Konstantinos%20Kotrotsios"> Konstantinos Kotrotsios</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandros%20I.%20Metsai"> Alexandros I. Metsai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern server systems, business critical applications run in different types of infrastructure, such as cloud systems, physical machines and virtualization. Often, due to high load and over time, various hardware faults occur in servers that translate to errors, resulting to malfunction or even server breakdown. CPU, RAM and hard drive (HDD) are the hardware parts that concern server administrators the most regarding errors. In this work, selected RAM, HDD and CPU errors, that have been observed or can be simulated in kernel ring buffer log files from two groups of Linux servers, are investigated. Moreover, a severity characterization is given for each error type. Better understanding of such errors can lead to more efficient analysis of kernel logs that are usually exploited for fault diagnosis and prediction. In addition, this work summarizes ways of simulating hardware errors in RAM and HDD, in order to test the error detection and correction mechanisms of a Linux server. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hardware%20errors" title="hardware errors">hardware errors</a>, <a href="https://publications.waset.org/abstracts/search?q=Kernel%20logs" title=" Kernel logs"> Kernel logs</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20servers" title=" Linux servers"> Linux servers</a>, <a href="https://publications.waset.org/abstracts/search?q=RAM" title=" RAM"> RAM</a>, <a href="https://publications.waset.org/abstracts/search?q=hard%20disk" title=" hard disk"> hard disk</a>, <a href="https://publications.waset.org/abstracts/search?q=CPU" title=" CPU"> CPU</a> </p> <a href="https://publications.waset.org/abstracts/140496/hardware-error-analysis-and-severity-characterization-in-linux-based-server-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140496.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">154</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">446</span> An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Khattab">Ahmed Khattab</a>, <a href="https://publications.waset.org/abstracts/search?q=Bassem%20Shetta"> Bassem Shetta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raspberry%20Pi" title="Raspberry Pi">Raspberry Pi</a>, <a href="https://publications.waset.org/abstracts/search?q=E-mail" title=" E-mail"> E-mail</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20automation" title=" home automation"> home automation</a>, <a href="https://publications.waset.org/abstracts/search?q=temperature%20sensor" title=" temperature sensor"> temperature sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=PIR%20sensor" title=" PIR sensor"> PIR sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=actuators" title=" actuators"> actuators</a>, <a href="https://publications.waset.org/abstracts/search?q=relay" title=" relay"> relay</a> </p> <a href="https://publications.waset.org/abstracts/93961/an-internet-of-things-based-home-automation-based-on-raspberry-pi-and-node-js-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93961.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">445</span> Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusuf%20Ibrahim%20Gwanda"> Yusuf Ibrahim Gwanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajesh%20Prasad"> Rajesh Prasad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reliability" title="reliability">reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=availability%20Gumbel-Hougaard%20family%20copula" title=" availability Gumbel-Hougaard family copula"> availability Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=MTTF" title=" MTTF"> MTTF</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20data%20centre" title=" internet data centre"> internet data centre</a> </p> <a href="https://publications.waset.org/abstracts/17889/reliability-analysis-of-computer-centre-at-yobe-state-university-using-lru-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">531</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">444</span> Presenting Internals of Networks Using Bare Machine Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joel%20Weymouth">Joel Weymouth</a>, <a href="https://publications.waset.org/abstracts/search?q=Ramesh%20K.%20Karne"> Ramesh K. Karne</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexander%20L.%20Wijesinha"> Alexander L. Wijesinha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bare%20machine%20computing" title="bare machine computing">bare machine computing</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20research" title=" online research"> online research</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20technology" title=" network technology"> network technology</a>, <a href="https://publications.waset.org/abstracts/search?q=visualizing%20network%20internals" title=" visualizing network internals"> visualizing network internals</a> </p> <a href="https://publications.waset.org/abstracts/142622/presenting-internals-of-networks-using-bare-machine-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142622.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">172</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">443</span> Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fault%20tolerance" title="fault tolerance">fault tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=improved%20RSA" title=" improved RSA"> improved RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement" title=" key agreement"> key agreement</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title=" proxy signature"> proxy signature</a> </p> <a href="https://publications.waset.org/abstracts/51456/implementing-fault-tolerance-with-proxy-signature-on-the-improvement-of-rsa-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">442</span> Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gigih%20Supriyatno">Gigih Supriyatno</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=web%20forensic" title="web forensic">web forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection" title=" SQL injection"> SQL injection</a>, <a href="https://publications.waset.org/abstracts/search?q=investigation" title=" investigation"> investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20shell" title=" web shell"> web shell</a> </p> <a href="https://publications.waset.org/abstracts/95122/searching-for-forensic-evidence-in-a-compromised-virtual-web-server-against-sql-injection-attacks-and-php-web-shell" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">441</span> 3D Remote Sensing Images Parallax Refining Based On HTML5</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Qian%20Pei">Qian Pei</a>, <a href="https://publications.waset.org/abstracts/search?q=Hengjian%20Tong"> Hengjian Tong</a>, <a href="https://publications.waset.org/abstracts/search?q=Weitao%20Chen"> Weitao Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Hai%20Wang"> Hai Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yanrong%20Feng"> Yanrong Feng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Horizontal parallax is the foundation of stereoscopic viewing. However, the human eye will feel uncomfortable and it will occur diplopia if horizontal parallax is larger than eye separation. Therefore, we need to do parallax refining before conducting stereoscopic observation. Although some scholars have been devoted to online remote sensing refining, the main work of image refining is completed on the server side. There will be a significant delay when multiple users access the server at the same time. The emergence of HTML5 technology in recent years makes it possible to develop rich browser web application. Authors complete the image parallax refining on the browser side based on HTML5, while server side only need to transfer image data and parallax file to browser side according to the browser’s request. In this way, we can greatly reduce the server CPU load and allow a large number of users to access server in parallel and respond the user’s request quickly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=3D%20remote%20sensing%20images" title="3D remote sensing images">3D remote sensing images</a>, <a href="https://publications.waset.org/abstracts/search?q=parallax" title=" parallax"> parallax</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20refining" title=" online refining"> online refining</a>, <a href="https://publications.waset.org/abstracts/search?q=rich%20browser%20web%20application" title=" rich browser web application"> rich browser web application</a>, <a href="https://publications.waset.org/abstracts/search?q=HTML5" title=" HTML5"> HTML5</a> </p> <a href="https://publications.waset.org/abstracts/19927/3d-remote-sensing-images-parallax-refining-based-on-html5" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19927.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">461</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">440</span> A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20El-Kamchouchi">H. El-Kamchouchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20Gaber"> Heba Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Ahmed"> Fatma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Dalia%20H.%20El-Kamchouchi"> Dalia H. El-Kamchouchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=proxy%20signature" title="proxy signature">proxy signature</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20tolerance" title=" fault tolerance"> fault tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=rsa" title=" rsa"> rsa</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20agreement%20protocol" title=" key agreement protocol"> key agreement protocol</a> </p> <a href="https://publications.waset.org/abstracts/51452/a-secure-proxy-signature-scheme-with-fault-tolerance-based-on-rsa-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51452.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">439</span> On a Single Server Queue with Arrivals in Batches of Variable Size, Generalized Coxian-2 Service and Compulsory Server Vacations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kailash%20C.%20Madan">Kailash C. Madan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We study the steady state behaviour of a batch arrival single server queue in which the first service with general service times is compulsory and the second service with general service times is optional. We term such a two phase service as generalized Coxian-2 service. Just after completion of a service the server must take a vacation of random length of time with general vacation times. We obtain steady state probability generating functions for the queue size as well as the steady state mean queue size at a random epoch of time in explicit and closed forms. Some particular cases of interest including some known results have been derived. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=batch%20arrivals" title="batch arrivals">batch arrivals</a>, <a href="https://publications.waset.org/abstracts/search?q=compound%20Poisson%20process" title=" compound Poisson process"> compound Poisson process</a>, <a href="https://publications.waset.org/abstracts/search?q=generalized%20Coxian-2%20service" title=" generalized Coxian-2 service"> generalized Coxian-2 service</a>, <a href="https://publications.waset.org/abstracts/search?q=steady%20state" title=" steady state"> steady state</a> </p> <a href="https://publications.waset.org/abstracts/35090/on-a-single-server-queue-with-arrivals-in-batches-of-variable-size-generalized-coxian-2-service-and-compulsory-server-vacations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35090.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">438</span> Thermal Performance of Fully Immersed Naturally Cooled Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yaser%20Al-Anii">Yaser Al-Anii</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulmajeed%20Almaneea"> Abdulmajeed Almaneea</a>, <a href="https://publications.waset.org/abstracts/search?q=Jonathan%20L.%20Summers"> Jonathan L. Summers</a>, <a href="https://publications.waset.org/abstracts/search?q=Harvey%20M.%20Thompson"> Harvey M. Thompson</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikil%20Kapur"> Nikil Kapur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The natural convection cooling system of a fully immersed server in a dielectric liquid is studied numerically. In the present case study, the dielectric liquid represents working fluid and it is in contact with server inside capsule. The capsule includes electronic component and fluid which can be modeled as saturated porous media. This medium follow Darcy flow regime and assumed to be in balance between its components. The study focus is on role of spatial parameters on thermal behavior of convective heat transfer. Based on server known unit, which is 1U, two parameters Ly and S are changed to test their effect. Meanwhile, wide-range of modified Rayleigh number, which is 0.5 to 300, are covered to better understand thermal performance. Navier-Stokes equations are used to model physical domain. Furthermore, successive over-relaxation and time marching techniques are used to solve momentum and energy equation. From obtained correlation, the in-between distance S is more effective on Nusselt number than distance to edge Ly by approximately 14%. In addition, as S increases, the average Nusselt number of the upper unit increases sharply, whereas the lower one keeps on the same level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=convective%20cooling%20of%20server" title="convective cooling of server">convective cooling of server</a>, <a href="https://publications.waset.org/abstracts/search?q=Darcy%20flow" title=" Darcy flow"> Darcy flow</a>, <a href="https://publications.waset.org/abstracts/search?q=liquid-immersed%20server" title=" liquid-immersed server"> liquid-immersed server</a>, <a href="https://publications.waset.org/abstracts/search?q=porous%20media" title=" porous media"> porous media</a> </p> <a href="https://publications.waset.org/abstracts/24866/thermal-performance-of-fully-immersed-naturally-cooled-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24866.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">437</span> Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Senesh%20Wijayarathne">Senesh Wijayarathne</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=slmail%20server" title="slmail server">slmail server</a>, <a href="https://publications.waset.org/abstracts/search?q=extended%20instruction%20pointer" title=" extended instruction pointer"> extended instruction pointer</a>, <a href="https://publications.waset.org/abstracts/search?q=jump%20to%20the%20esp%20register" title=" jump to the esp register"> jump to the esp register</a>, <a href="https://publications.waset.org/abstracts/search?q=bad%20characters" title=" bad characters"> bad characters</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20machine" title=" virtual machine"> virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=windows%207" title=" windows 7"> windows 7</a>, <a href="https://publications.waset.org/abstracts/search?q=kali%20Linux" title=" kali Linux"> kali Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=buffer%20overflow" title=" buffer overflow"> buffer overflow</a>, <a href="https://publications.waset.org/abstracts/search?q=Seattle%20lab" title=" Seattle lab"> Seattle lab</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/150375/exploiting-slmail-server-with-a-developed-buffer-overflow-with-kali-linux" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150375.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">436</span> Thermal Performance of Fully Immersed Server into Saturated Fluid Porous Medium</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yaser%20Al-Anii">Yaser Al-Anii</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulmajeed%20Almaneea"> Abdulmajeed Almaneea</a>, <a href="https://publications.waset.org/abstracts/search?q=Jonathan%20L.%20Summers"> Jonathan L. Summers</a>, <a href="https://publications.waset.org/abstracts/search?q=Harvey%20M.%20Thompson"> Harvey M. Thompson</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikil%20Kapur"> Nikil Kapur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The natural convection cooling system of a fully immersed server in dielectric liquid is studied numerically. In present case study, the dielectric liquid represents working fluid and it is in contact with server inside capsule. The capsule includes electronic component and fluid, which can be modelled as saturated porous media. This medium follow Darcy flow regime and assumed to be in balance between its components. The study focus is on role of spatial parameters on thermal behavior of convective heat transfer. Based on server known unit, which is 1U, two parameters Ly and S are changed to test their effect. Meanwhile, wide range of modified Rayleigh number, which is 0.5 to 300, are covered to better understand thermal performance. Navier-Stokes equations are used to model physical domain. Furthermore, successive over relaxation and time marching techniques are used to solve momentum and energy equation. From obtained correlation, the in-between distance S is more effective on Nusselt number than distance to edge Ly by approximately 14%. In addition, as S increase, the average Nusselt number of the upper unit is increased sharply, whereas the lower one keeps on same level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=convective%20cooling%20of%20server" title="convective cooling of server">convective cooling of server</a>, <a href="https://publications.waset.org/abstracts/search?q=darcy%20flow" title=" darcy flow"> darcy flow</a>, <a href="https://publications.waset.org/abstracts/search?q=liquid-immersed%20server" title=" liquid-immersed server"> liquid-immersed server</a>, <a href="https://publications.waset.org/abstracts/search?q=porous%20media" title=" porous media"> porous media</a> </p> <a href="https://publications.waset.org/abstracts/24864/thermal-performance-of-fully-immersed-server-into-saturated-fluid-porous-medium" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24864.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">435</span> A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ming%20Lun%20Wang">Ming Lun Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yan%20Wang"> Yan Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Ning%20Ruo%20Sun"> Ning Ruo Sun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20storage%20security" title="cloud storage security">cloud storage security</a>, <a href="https://publications.waset.org/abstracts/search?q=sharing%20storage" title=" sharing storage"> sharing storage</a>, <a href="https://publications.waset.org/abstracts/search?q=attributes" title=" attributes"> attributes</a>, <a href="https://publications.waset.org/abstracts/search?q=Hash%20algorithm" title=" Hash algorithm"> Hash algorithm</a> </p> <a href="https://publications.waset.org/abstracts/52205/a-security-cloud-storage-scheme-based-accountable-key-policy-attribute-based-encryption-without-key-escrow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52205.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">390</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">434</span> Interplay of Power Management at Core and Server Level</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J%C3%B6rg%20Lenhardt">Jörg Lenhardt</a>, <a href="https://publications.waset.org/abstracts/search?q=Wolfram%20Schiffmann"> Wolfram Schiffmann</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%B6rg%20Keller"> Jörg Keller</a> </p> <p class="card-text"><strong>Abstract:</strong></p> While the feature sizes of recent Complementary Metal Oxid Semiconductor (CMOS) devices decrease the influence of static power prevails their energy consumption. Thus, power savings that benefit from Dynamic Frequency and Voltage Scaling (DVFS) are diminishing and temporal shutdown of cores or other microchip components become more worthwhile. A consequence of powering off unused parts of a chip is that the relative difference between idle and fully loaded power consumption is increased. That means, future chips and whole server systems gain more power saving potential through power-aware load balancing, whereas in former times this power saving approach had only limited effect, and thus, was not widely adopted. While powering off complete servers was used to save energy, it will be superfluous in many cases when cores can be powered down. An important advantage that comes with that is a largely reduced time to respond to increased computational demand. We include the above developments in a server power model and quantify the advantage. Our conclusion is that strategies from datacenters when to power off server systems might be used in the future on core level, while load balancing mechanisms previously used at core level might be used in the future at server level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=power%20efficiency" title="power efficiency">power efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=static%20power%20consumption" title=" static power consumption"> static power consumption</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20power%20consumption" title=" dynamic power consumption"> dynamic power consumption</a>, <a href="https://publications.waset.org/abstracts/search?q=CMOS" title=" CMOS"> CMOS</a> </p> <a href="https://publications.waset.org/abstracts/42439/interplay-of-power-management-at-core-and-server-level" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42439.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=15">15</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=16">16</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=proxy%20server&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>